Sciweavers

5451 search results - page 904 / 1091
» Typed Operational Semantics
Sort
View
219
Voted
AICT
2009
IEEE
172views Communications» more  AICT 2009»
15 years 10 months ago
A Practical Characterization of 802.11 Access Points in Paris
Unlike other wireless technologies, the deployment of 802.11 networks is not limited to operators: access points can easily be installed by end-users for domestic use. This singul...
Guillaume Valadon, Florian Le Goff, Christophe Ber...
HICSS
2009
IEEE
155views Biometrics» more  HICSS 2009»
15 years 10 months ago
Collaborative Recommender Systems for Building Automation
Building Automation Systems (BASs) can save building owners money by reducing energy consumption while simultaneously preserving occupant comfort. There are algorithms that optimi...
Michael LeMay, Jason J. Haas, Carl A. Gunter
ISBI
2009
IEEE
15 years 10 months ago
Direct Adaptive Algorithms for CT Reconstruction
This work concerns with linear and spatially-adaptive direct reconstruction algorithms for 2-D parallel-beam transmission tomography, extending the Filtered Back-Projection (FBP)....
Joseph Shtok, Michael Elad, Michael Zibulevsky
CCS
2009
ACM
15 years 10 months ago
Reactive noninterference
Many programs operate reactively, patiently waiting for user input, subsequently running for a while producing output, and eventually returning to a state where they are ready to ...
Aaron Bohannon, Benjamin C. Pierce, Vilhelm Sj&oum...
CCS
2009
ACM
15 years 10 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...